Applied Mechanics and Materials Vols. 513-517

Paper Title Page

Abstract: The intelligent manufacturing systems are in networked framework via a variety of networking communication systems integrating the heterogeneous collections of manufacturing worker, material, devices and real-time information. This paper presents a intelligent manufacturing system that is implemented by Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN). The system monitors and controls with the clear objective of maximizing the Quality of Service (QoS) provided by the manufacturing resources and to analyze and make decision. This study describes the design and implementation of the system developed as well as performance testing and evaluation results, in terms of system transmission delay and energy consumption.
1256
Abstract: The three-dimensional spatial target tracking based on wireless communication technology has attracted more and more attention due to its importance in the field of Internet of Things.However,there are still some problems including calculation overhead is too high and power consumption is too large.Thus,a distributed three-dimensional target tracking mechanism for the environment of the Internet of Things is proposed.The network structure in the algorithm uses spatial clustering structure, which includes two tier sleep scheduling mechanisms and unite cluster head mechanism. A spatial segmental linear fitting method is adopted to track the target,which have effectively reduced the network overhead and improved tracking efficiency. It also provides a scheduling strategy how to wake up the sensor node guarantee to continue tracking it,when the mobile target lost.Simulation results show that the algorithm is better than the existing target tracking algorithm in tracking efficiency and have a lower power consumption.
1261
Abstract: A common approach in Infrastructure-as-a-Service Clouds or virtualized Grid computing is to provide virtual machines to customers to execute their software on remote resources. Giving full superuser permissions to customers eases the installation and use of user software, but it may lead to security issues. The providers usually delegate the task of keeping virtual machines up to date to the customers, while the customers expect the providers to perform this task. Consequently, a large number of virtual machines (either running or dormant) are not patched against the latest software vulnerabilities. The approach presented in this article deals with these problems by helping users as well as providers to keep virtual machines up to date. Prior to the update step, it is crucial to know which software is actually outdated or affected by remote security vulnerabilities. While these tasks seem to be straight forward, developing a solution that handles multiple software repositories from different vendors and identifies the correct packages is a challenging task. The Update Checker presented in this article identifies outdated software packages in virtual machines, regardless if the virtual machine is running or dormant on disk. The proposed Online Penetration Suite performs pre-rollout scans of virtual machines for security vulnerabilities using established techniques and prevents execution of flawed virtual machines.
1268
Abstract: Specific scenario of competitive relationships like cost and revenue existing between different enterprises which be linked should be taken into account in generating the optimal status based on a non-cooperative game-theoretic mathematical solution for each link in EIS. Paper proposed three-level nested solution algorithm by developing the lineation method to find the NE point of the game. The computational results showed that the proposed lineation-based three-level nested solution algorithm is capable to obtain optimal solution for the test problems.
1274
Abstract: Document similarity computation is an exciting research topic in information retrieval (IR) and it is a key issue for automatic document categorization, clustering analysis, fuzzy query and question answering. Topic model is an emerging field in natural language processing (NLP), IR and machine learning (ML). In this paper, we apply a latent Dirichlet allocation (LDA) topic model-based method to compute similarity between documents. By mapping a document with term space representation into a topic space, a distribution over topics derived for computing document similarity. An empirical study using real data set demonstrates the efficiency of our method.
1280
Abstract: In the sustainable development of private universities, stable teachers team is the guarantee of talent training. For colleges or universities, it has important significance to analysis the main factors which cause teachers loss.C4.5 algorithm is a kind of machine learning algorithm in the classification decision tree algorithm. Decision tree is the main technology of data mining classification and prediction. Through the survey data from the information, it establishes the teacher turnover tendency decision tree model using C4.5 algorithm to provide the decision-making basis for the university management work.
1285
Abstract: This paper researched on Needham-Schroeder symmetric key authentication protocol based on BAN logic. It pointed out the flaw of the protocol which can be used by replay attack and improved the protocol by adding nonce in the transferred message. Then it listed the improved NS authentication protocol. Finally, this paper proved the improved protocol successful and available with BAN logic.
1289
Abstract: Exchanging and sharing information are the basic request for the Digital Campus. To deal with the current problems of information sharing and integration, the content and framework of the universal data interchange platform are introduced in terms of the categories of processes and the layers of information exchange. And a data interchange model was developed to elaborate the data exchange between different departments on campus. Four key technologies, such as XML data model, XML data hybrid storage, data standard construction and data import & export module are presented so as to define the implementation and exchange paths. The current practice of implement the exchange standards and future study are also discussed.
1294
Abstract: To the situation of hardness of Mybatis pagination, propose an interceptor based general physical pagination component. The component is designed by MVC(model-view-controller). Controller is realized using annotation based controller of Spring MVC. To design the business logic layer core method into general, DAO method custom and generic model was introduced. Interceptor was introduced into data persistence layer to realize physical pagination. JSP is used in page displaying. Give the detailed realization process of the component. Application results show that the proposed component has good generalization and portability, high execution efficiency and better flexibility.
1299
Abstract: In the recent years, the design and analysis of the security of e-commerce protocol has become a hot scheme. The confidentiality and fairness are important properties to measure the security of the e-commerce. It's also the important prerequisite of the successful protocol. Confidentiality and fairness are the basic properties of the secure e-commerce protocol. But the certified e-mail protocol as one of the e-commerce protocol can't satisfy these properties. This paper points out some drawbacks of teh CMP protocol, and analyses the protocol and makes improvements. The improved CMP protocol satisfies the confidentiality and fairness.
1305

Showing 281 to 290 of 1031 Paper Titles